Enterasys-networks 9034385 Bedienungsanleitung Seite 81

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 80
Assessment Design Procedures
Enterasys NAC Design Guide 5-17
ManagerwillnotmatchthisendsystemandtheendsystemisassignedtheSecurityDomain’s
defaultNACconfiguration.Inaddition,theLayer3NACControllerisnotabletodeterminethe
usernameassociatedtothedownstreamendsystemformatchingagainstuseroverrides,andthe
endsystemisassignedthe
SecurityDomain’sdefaultNACconfiguration.
Assessment Design Procedures
ThefollowingsectionprovidesthedesignproceduresforimplementingassessmentinyourNAC
deployment.
1. Determine the Number of Assessment Servers
AssessmentserversareusedtoimplementassessmentfunctionalityinNACdeployments.Usethe
followingparameterstodeterminethenumberofrequiredassessmentserversforyour
deployment:
•Loadsharingrequirements.
Morethanoneassessmentservermayberequiredtohandlethe numberofendsystemsbeing
assessedatanyonetime.Thenumber
ofendsystemsthatcanbeassessedatthesametime
andtheamountoftimerequiredtocompleteanassessmentisdeterminedbythenumberof
vulnerabilitiesbeingassessed,throughputlimitationsonthenetwork,andthehardware
specificationsoftheassessmentservermachine.Loadsharingofendsystemassessment
is
implementedinaroundrobinfashionbetweentheassessmentserversavailableinthe
assessmentresourcepool.
Assessmentserverredundancy.
Toprovideredundancy,atleasttwoassessmentserversshouldbeconfiguredperNAC
deployment,withadditionalassessmentserversaddedforloadbalancingandscalability
purposes.
Thesameassessmentservercanbeused
formultipleSecurityDomains,andeachassessment
servercanassessendsystemsusingdifferentsetsofassessmentparameters,dependingonthe
device,user,orlocationisinthenetwork.Herearesomeexamples:
•Ifguests andotheruntrustedusersaretobeassessedforadifferentsetofsecurity
vulnerabilitiesthan
trustedusers,aSecurityDomaincanbeassociatedtotheareasofthe
networkwhereuntrustedusersconnect,andcanspecifyanAssessmentConfigurationthat
usesassessmentserversconfiguredfortheassessmentofuntrustedusers.Iftrustedusers
connecttothissameSecurityDomain,anotherAssessmentConfigurationthatleverages
assessment
serversconfiguredtoassessvulnerabilitiesoftrusteduserscanbeutilized.Note
thatifseveralSecurityDomainsrequirethesameassessmentparameters,thentheseSecurity
DomainscanbeconfiguredtousethesameAssessmentConfiguration.
•Ifacertaintypeofendsystem (forexample,anendsystemofaparticularmodel,
havinga
particularOS,andrunningspecificservices)connectstothenetworkinacertainarea,oris
identifiedbyMACaddress,aSecurityDomainandMACoverridecanbeassociatedtothis
areaofthenetworkthatusesanAssessmentConfigurationthatleveragesassessmentservers
thatassessvulnerabilitiesspecificto
thattypeofendsystem.Forexample,anareaofthe
networkwhereMicrosoftIASserversconnectorwherePolycomIPphonesconnectcanbe
configuredtoutilizeanassessmentserverconfiguredtoscanforMicrosoftIASwebserver
relatedvulnerabilitiesorPolycomIPphonedefaultsettings.
Seitenansicht 80
1 2 ... 76 77 78 79 80 81 82 83 84 85 86 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare